NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 661 to 675 of 3,392 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Bixler, Brett A.; Land, Susan M. – Journal of Educational Technology Systems, 2011
The purpose of this research was to investigate the effects of using cognitive and metacognitive prompting strategies in a web-based learning environment to engage college students in a complex, ill-structured task. The course context was a freshman/sophomore level Information Sciences and Technology course, and the topic was web design. Four…
Descriptors: College Students, Prompting, Problem Solving, Educational Environment
Dong, Xiao – ProQuest LLC, 2010
Workflow technology has emerged as an eminent way to support scientific computing nowadays. Supported by mature technological infrastructures such as web services and high performance computing infrastructure, workflow technology has been well adopted by scientific community as it offers an effective framework to prototype, modify and manage…
Descriptors: Work Environment, Data Processing, Pattern Recognition, Semantics
Caudle, Daryl L. – ProQuest LLC, 2010
The nation's critical infrastructure, information systems, and telecommunication networks are vulnerable and threatened by an ever-growing number of attacks in cyberspace. An essential element of the nation's comprehensive approach to cybersecurity is the ability for the Department of Defense to protect and defend its information enterprise.…
Descriptors: Information Systems, Organizational Change, Telecommunications, Information Technology
Kupcu, Alptekin – ProQuest LLC, 2010
Peer-to-peer (P2P) systems, and client-server type storage and computation outsourcing constitute some of the major applications that the next generation cloud schemes will address. Since these applications are just emerging, it is the perfect time to design them with security and privacy in mind. Furthermore, considering the high-churn…
Descriptors: Internet, Computer Software, Computer Science, Computers
Fan, Quyin – ProQuest LLC, 2010
Program comprehension is the most important and frequent process in software maintenance. Extensive research has found that individual characteristics of programmers, differences of computer programs, and differences of task-driven motivations are the major factors that affect the program comprehension results. There is no study specifically…
Descriptors: Computer Software, Maintenance, Programming, Employees
Ehrlich, Justin – ProQuest LLC, 2010
The application of virtual reality is becoming ever more important as technology reaches new heights allowing virtual environments (VE) complete with global illumination. One successful application of virtual environments is educational interventions meant to treat individuals with autism spectrum disorder (ASD). VEs are effective with these…
Descriptors: Realism, Intervention, Computer Simulation, Autism
Nagasinghe, Iranga – ProQuest LLC, 2010
This thesis investigates and develops a few acceleration techniques for the search engine algorithms used in PageRank and HITS computations. PageRank and HITS methods are two highly successful applications of modern Linear Algebra in computer science and engineering. They constitute the essential technologies accounted for the immense growth and…
Descriptors: Graphs, Search Engines, Engineering, Computer Science
Sheng, Bo – ProQuest LLC, 2010
Pervasive computing is an emerging concept that thoroughly brings computing devices and the consequent technology into people's daily life and activities. Most of these computing devices are very small, sometimes even "invisible", and often embedded into the objects surrounding people. In addition, these devices usually are not isolated, but…
Descriptors: Influence of Technology, Time, Efficiency, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bers, Marina U. – Early Childhood Research & Practice, 2010
This article describes the TangibleK robotics program for young children. Based on over a decade of research, this program is grounded on the belief that teaching children about the human-made world, the realm of technology and engineering, is as important as teaching them about the natural world, numbers, and letters. The TangibleK program uses…
Descriptors: Young Children, Computer Science, Engineering, Kindergarten
Peer reviewed Peer reviewed
Direct linkDirect link
Sanborn, Adam N.; Griffiths, Thomas L.; Navarro, Daniel J. – Psychological Review, 2010
Rational models of cognition typically consider the abstract computational problems posed by the environment, assuming that people are capable of optimally solving those problems. This differs from more traditional formal models of cognition, which focus on the psychological processes responsible for behavior. A basic challenge for rational models…
Descriptors: Models, Cognitive Processes, Psychology, Monte Carlo Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Bachman, Dale J.; Brown, Ezra A.; Norton, Anderson H. – Mathematics Teacher, 2010
Cryptography is the science of hidden or secret writing. More generally, cryptography refers to the science of safeguarding information. Cryptography allows people to use a public medium such as the Internet to transmit private information securely, thus enabling a whole range of conveniences, from online shopping to personally printed movie…
Descriptors: Intellectual Property, Privacy, Computer Security, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Technology Teacher, 2008
As teachers search for the most appropriate form of TIDE education for the future, they must consider as many alternatives as possible. One such alternative is computational science, which is described in detail in this interview with Dr. Aaron Clark of North Carolina State University. Dr. Clark recently agreed to this interview, with the primary…
Descriptors: Computer Science, Technology Education, Interviews, College Faculty
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Langan, Anthony Mark; Dunleavy, Peter; Fielding, Alan – Education Sciences, 2013
Many countries use national-level surveys to capture student opinions about their university experiences. It is necessary to interpret survey results in an appropriate context to inform decision-making at many levels. To provide context to national survey outcomes, we describe patterns in the ratings of science and engineering subjects from the…
Descriptors: Models, National Surveys, Undergraduate Students, College Science
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Ling; Liu, Yang; Gallagher, Marcus; Pailthorpe, Bernard; Sadiq, Shazia; Shen, Heng Tao; Li, Xue – Journal of Information Systems Education, 2012
The demand for graduates with exposure in Cloud Computing is on the rise. For many educational institutions, the challenge is to decide on how to incorporate appropriate cloud-based technologies into their curricula. In this paper, we describe our design and experiences of integrating Cloud Computing components into seven third/fourth-year…
Descriptors: Computers, Schools, Foreign Countries, Computer Science
Peer reviewed Peer reviewed
Direct linkDirect link
Ludi, Stephanie; Reichlmayr, Tom – ACM Transactions on Computing Education, 2011
This article describes an outreach program to broaden participation in computing to include more students with visual impairments. The precollege workshops target students in grades 7-12 and engage students with robotics programming. The use of robotics at the precollege level has become popular in part due to the availability of Lego Mindstorm…
Descriptors: High School Students, Visual Impairments, Middle School Students, Outreach Programs
Pages: 1  |  ...  |  41  |  42  |  43  |  44  |  45  |  46  |  47  |  48  |  49  |  ...  |  227